Many people believe that diabetes appears after a psychological crisis, which is a misconception but it could be in them before having a crisis ore the crisis. But emotion increases the appearance of symptoms, and athletes are at risk of developing diabetes. Hypoglycemia is not unusual for athletes, and during physical activity the sugar level changes in the blood. Therefore, it is important to conduct tests for the measurement of sugar before and immediately after the activity, for the purpose of detecting the sharp drop in the sugar level and treating it, and the early detection is necessary to avoid the possibility of diabetes, the concept of psychological immunity in psychology is considered a positive concepts that maintain the balance of the athlete and the non-athlete between him and his materialistic environment and his social environment ,The research problem: A comparative study of the possibility of diabetes and psychological immunity for male and female players of badminton in the youth category, and there are several questions branching out of it: To determine the degree of probability of diabetes in male and female players of badminton in the youth category. Conducting a comparison between the two sex categories in the possibility of diabetes and mental health. To identify the relationship between the possibility of diabetes and psychological immunity for male and female players of .The purpose of the research. Is to identify the degree of probability of developing diabetes and the psychological immunity of male and female players of badminton in the youth category, and to identify the differences between the male and the female badminton players in the probability of diabetes and psychological immunity. The research methodology: The researchers used the descriptive approach on a sample of male and female badminton players (2), and a measurement was applied to determine the probability of diabetes probability prepared by Dr. Nermin Zakaria 0 family medicine specialist) and Dr. Khalid Al-Zayed, head of Al Adn Health Center in the Ministry of Health (Adan Health Center) Kuwait, The test consists of (7) paragraphs, and the measurement of psychological immunity prepared by Kamel Abboud Hussein and Osama Abdul Qader, 2016, the measurement consists of (39) positions which are displayed to be answered by the male and female players, the researchers concluded: the members of the male sample of players have a degree Of the psychological immunity while the female players do not have a degree of psychological immunity. The researchers recommend: the need to apply other psychological standards on the same sample.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables